Lab 5 - User Management and LDAP Installation
Objectives
- Understand how users and groups are stored and created in Linux and Unix
- Manually create users and groups on both platforms
- Demonstrate an ability to switch between users
- Docker is installed and running
- LLDAP is installed, running, and publicly accessible
Stage 1 - Lab Report
The primary deliverable of this lab will consist of a lab report. Instructions for each part of this lab constitute what I expect to see on the final lab report. Complete the following on your Ubuntu machine. At the end of the lab, you will repeat the process on your Unix (OPNSense) machine.
Step 1 - Manually Create a User
Using what you’ve learned, go through the process of manually creating a user by editing these files. DO NOT use the built-in commands to accomplish this. Document the steps you used to create the user. Make sure to also create a group in which the new user is the only member. Test that you can login to this new user using SSH (You only need to do this last part on your Ubuntu machine).
Be sure not to accidentally create a new user with a UID of "0", as that is the UID of the "root" user. Doing so may result in you locking yourself out of the primary account and being unable to login.
Step 2 - Useradd and Groupadd (And UNIX equivalents)
Now create another user using the useradd and groupadd. Document the commands used. Now, use the su command to switch between these users. Make sure to demonstrate you can swap between these users.
Step 3 - UNIX Comparison
Repeat steps 1 and 2 on your UNIX (OPNsense) machine. Mark down the differences you observe in Unix vs Linux. How are they the same? How are they different?
Please submit this lab report to the Lab 5 dropbox on eClass and continue to the next section.
Stage 2 - LDAP Setup
In this section, we will setup up an LDAP server which will be hosted in a docker container running on our Ubuntu machine.
Step 1 - Installing Docker
Visit the guide linked here to install Docker on your Ubuntu VM. We will be using Docker more extensively in the following labs, but for now we will be using it to host a service called lldap, a lightweight ldap implementation.
Validate that you are able to run sudo docker run hello-world
. If it executes as expected, continue to the next section.
Step 2 - Installing LLDAP
Visit the GitHub repository linked here for LLDAP. Inside the README.md file, you will notice it covers installation through several different methods. We will be using the recommended option and installing via Docker.
First, create a directory ~/lldap/ and create the following files inside of it:
- generate_secrets.sh
- docker-compose.yml
Be sure to copy the contents of all three files with equivalent names from the GitHub repository.
LLDAP provides a "docker compose" file named docker-compose.yml, given below:
version: "3"
volumes:
lldap_data:
driver: local
services:
lldap:
image: lldap/lldap:stable
ports:
# For LDAP, not recommended to expose, see Usage section.
#- "3890:3890"
# For LDAPS (LDAP Over SSL), enable port if LLDAP_LDAPS_OPTIONS__ENABLED set true, look env below
#- "6360:6360"
# For the web front-end
- "17170:17170"
volumes:
- "lldap_data:/data"
# Alternatively, you can mount a local folder
# - "./lldap_data:/data"
environment:
- UID=####
- GID=####
- TZ=####/####
- LLDAP_JWT_SECRET=REPLACE_WITH_RANDOM
- LLDAP_KEY_SEED=REPLACE_WITH_RANDOM
- LLDAP_LDAP_BASE_DN=dc=example,dc=com
- LLDAP_LDAP_USER_PASS=adminPas$word
We'll need to modify those last four environment variables. Run ./generate_secrets.sh
and copy the outputs into the LLDAP_JWT_SECRET and LLDAP_KEY_SEED variables respectively. Next, modify the LLDAP_LDAP_BASE_DN variable to be dc=<your_username>,dc=lan
. For example, mine is dc=mirom,dc=lan
. Finally, modify the LLDAP_USER_PASS variable with an admin password of your choosing.
Also, be sure to modify the following fields to the following:
- UID=1000
- GID=1000
- TZ=America/New_York
Once this has has been completed, run the sudo docker compose up
command from within the lldap folder. Docker should now begin pulling the image from the DockerHub repository and running it momentarily. If all goes well, you should see logs that look similar to the following. Shut it down using Ctrl + C after you verify that it's running, so you can execute it as a daemon later.
Now, execute lldap as a daemon service using the following command: sudo docker compose up -d
. This will allow the docker container to execute as a background process. You can stop it at any time by navigating into the ~/lldap directory and running sudo docker compose down
.
Step 3 - Making the LLDAP Web UI accessible
In the real world, we would not want to make LLDAP accessible outside the network in this manner. However, doing so for the purposes of this lab makes things somewhat easier for us.
Notice the information under the ports directive inside the docker-compose.yml. You can see that it is exposing and binding port 17170 from the docker container to your Ubuntu machine. If we want to be able to access this from outside the personal private network, we must also port forward this port in OPNsense so that we can access this service in the browser using <your_opnsense_ip>:17170. Refer back to lab 1 for guidance on port forwarding.
Because port 17170 is not a standard port, OPNsense will not have a pre-included "name" for this service. When selecting the port, search for "other", then enter the port number in the box that appears below, like so:
At this point, you should be able to access the LLDAP Web UI from any computer connected to the CS network (Either a lab computer or through the VPN) on this port. Login using the username admin, and the password will be whatever the value of LLDAP_LDAP_USER_PASS was in the docker-compose.yml file.
Wrapping Up
In this lab, we explored user management and began to lay the groundwork for integration LDAP into our environment. In upcoming labs, we will integrate LDAP with our Ubuntu's OS, as well as with other services which will be hosted through Docker.
Deliverables
- Lab Report from Stage 1
- Docker is installed, and the hello-world example works
- LLDAP is installed and running
- The LLDAP Web UI is publicly accessible
No Comments